Key Management Schemes in MANET-A Detailed Review: Dr.S.Sekar
Key Management Schemes in MANET-A Detailed Review: Dr.S.Sekar
Key Management Schemes in MANET-A Detailed Review: Dr.S.Sekar
I. INTRODUCTION
Over the last few years, due to the proliferation of monitoring of different attacks would be difficult. Therefore
affordable, readily available wireless devices, a massive MANET is vulnerable to assault [6].
expansion in the field of mobile computing has occurred. In MANET, all networking tasks, such as routing and packet
Recent second-generation (2G) cellular systems have forwarding, are carried out in a self-organizing way by nodes
achieved a high rate of penetration and enabled mobile themselves. Of these reasons, it is very difficult to secure a
connectivity worldwide. Mobile users can check emails and mobile ad-hoc network [7]. Since multicast routing needs
browse the internet. With 2 G upgrades, 3 G networks now more channels for transmitting the data, it can be subjected
deliver higher data speeds, infotainment, and location-based to multiple attacks. Multicast transmissions in MANET will
or customized services in mobile devices. This evolution fulfil the basic security requirements such as confidentiality,
motivates a novel alternative method, called an ad hoc authentication, and integrity [8]. IDS refer to the approach of
mobile network [1]. The contact between the mobile nodes tracking every node operation in a network [9]. IDS is used
will support the network providing the essential role of to detect various forms of attacks in a network and to defend
control and administration. MANET's biggest advantages are the network against external attacks [10]. Throughout
flexibility, ease of installation and robustness. Mobile nodes MANETs, support for group-oriented applications such as
are fitted with wireless radio, memory, power source, and audio/video conferencing and one-to-many distribution of
processor. Wireless ad hoc networks have more unique data throughout battlefield or disaster rescue scenarios is
features, and some drawbacks compared to wired networks important [11]. A trivial solution is that each member should
[2]. MANET is specified with purpose-specific, autonomous, publish a public key and hold the respective secret key, such
and dynamic characteristics. There is no master or slave that the message can be encrypted independently under the
relationship in a mobile ad hoc network, similar to fixed public keys of all users. This trivial solution is highly
wireless networks. Costs associated with network creation inefficient, however, since the cipher text increases linearly
are negligible due to the avoidance of fixed infrastructure. with the group size, and the sender must hold the public keys
Each node serves as a communications router [3]. In multi- of all group members [12]. By default, in MANETs the
casting, a node can at any time, randomly join or leave a nodes have the mobility function that they do not transmit on
group. A node may concurrently become a member of networks, and nodes communicate and interact with each
multiple classes. It can serve as a forwarding agent for other through the interfaces wireless [13]. The Ad-Hoc
transmitting data to other groups. Multicasting technique Mobile Networks are independent, open Wi-Fi systems.
where a several redundant messages should be sent to a MANETs consist of free-shifting cell nodes in and out of the
collection of receivers [4] can be implemented. Routing network. Nodes are the devices or units that communicate in
protocols in MANET typically presume the nodes are the network and are cell, i.e. mobile phones, tablets, non-
truthful and cooperative. But an attacker may be acting as a public digital assistance, MP3 players, and private laptops
router during routing and disrupting the routing process. It [14]. Fuzzy logic is a computational model that gives the
can communicate with any node. The battery power can be ambiguity and imprecision involved in human reasoning a
drained by an egoistic node. Such internal assaults are more logical system that is also known as indirect reasoning [15].
vulnerable than external assaults [5]. Because MANET has
no fixed infrastructure and a highly complex topology,
II. LITERATURE REVIEW This research introduces IDS strategies according to IDS
distributed architecture [27].
An optimized AODV protocol based on trust that detects A pyramidal security model to safeguard the
packing drop attacks that occur during data transmission has exchange of knowledge a multi-security level is used within
been proposed. Using the Ant Colony Optimization (ACO) one cooperation domain[58]. A pyramidal security model as
technique [16], a trust-based routing is performed and a popular function includes a collection of hierarchical
optimized. A scheme to strengthen current on-demand security groups and multicast groups [28]. A secure
routing protocols by implementing the energy-conscious construction of multicast tree is used with the help of the
routing concept for the backbone. The proposed protocol is Bacterial Foraging Optimization (BPO) algorithm to build a
an improvement of the current routing protocol for Ad hoc secure construction of multicast tree in MANET[59]. During
On- Request Distance Vector (AODV), which provides routing, the proposed algorithm uses the public routing proxy
considerably good routing services [17]. In DRMS nodes are to conceal sender and receiver identity from other nodes to
monitored and observed for malicious and selfish maintain confidentiality [29]. A two-step, secure
behaviours. Because of these attacks, it reduces the risk of multicasting authentication method is used in MANETs. A
network performance degradation. However, no technique Markov chain model was used to evaluate the confidence
was provided for raising the energy consumption involved in value of one-hoe neighbors based on historical confidence
packet forwarding [18]. An Optimized Multicast Backbone values [30]. A MANET intrusion detection method and
Routing for MANET was introduced in 2015. This improves compared IDSs to identify nodes that were misbehaving[56].
node residual energy and provides stability by enhancing The author described the Intrusion Detection Systems
access to the network. This routing protocol achieves a Architecture that has been implemented for MANETs until
greater packet distribution ratio [19]. With the problem of now and then presented and compared the current intrusion
group access for wireless ad hoc networks in secure detection techniques in MANET [31]. A theoretical online
multicast communication. We have integrated the network fuzzy risk assessment is used for distributed intrusion
topology (node location), the "power proximity" between prediction and prevention (DIPPS) systems[57]. This
network nodes, and the medium’s path loss characteristics in program senses potential intrusions and avoids them. DIPPS
key distribution tree design to conserve energy [20]. A novel can foresee possible intrusions within a distributed network
anonymous distributed secure routing protocol in ad hoc [32].
mobile wireless networks. Their protocol 's purpose is not An improvement of the MANET Intrusion
only to protect the privacy and private information of the Detection Watchdog / Pathrater model is proposed[55]. In
communicating nodes, but also to protect the protection of promiscuous mode, if the message is not transmitted within a
the discovery of the route and to prevent certain malicious certain timeframe, the participating nodes are permitted to
behaviours during the two-way conversation [21]. listen to the nodes they have communicated to, and then the
Artificial Neural Networks (ANN) to make multicast routing node is suggested to be marked as a misbehaving node [33].
in MANETs efficient and stable. The approach considers the A new intrusion-detection system called Enhanced Adaptive
selection of input variables for ANN, evaluating the optimal ACKnowledge (EAACK) developed specifically for
number of neurons for Multicasting's hidden Layer MANET[54]. The results showed good output against
collection with supporting node routing function [22]. A Watchdog, TWOACK, and AACK in cases of collision with
novel scheme for protecting delay sensitive data against the receiver, reduced transmitting capacity, and false
erroneous packet injection attacks on network-coded reporting of misbehaviour [34]. A novel method is used for
multicast. In particular, they proposed an efficient detecting attacks on port scanning using Fuzzy logic. To
authentication mechanism based on the null-space properties improve the efficiency of port scanning detection a fuzzy
of coded packets, to enable recipients to detect any high- logic controller is designed and integrated with Snort.
probability bogus packets [23]. A self-organized hash-based, Experiments are performed in wired as well as wireless
secure routing scheme is used for ad hoc multicast networks. networks [35]. A Monitoring Device used for Co-Operative
For main distribution, it uses the Diffie-Hellman group form. Intrusion in MANET. This system can be divided into three
Authentication of the route and credibility, both by modules, based on Normal and Attack mode packet transfer
generating local flag codes and global hash values is ensured [36]. A Grammatical Approach used for Detecting Attack on
[24].A suggested Hierarchical Cooperative IDS on MANETs MANETs. The author investigates the implementation of a
which incorporates the features of anomaly-based learning technique focused on artificial intelligence to
identification techniques and signature-based techniques to explore this challenging design space [37]. A Divulged IDS
guarantee an accurate and scalable IDS. In MANET various (DIDS) consists of rules for detecting intrusions, constructed
techniques of machine learning (ML) were used to provide from activity logs. The information obtained from the logs of
effective IDS [25]. A distributed, cooperative MANET IDS various devices was correlated [38].
focused on trust ties. The Network monitors the attacks A new scheme for detecting such malicious behaviour, based
locally and internationally. Whenever an anomaly is on statistical process control (SPC) borrowed from the
observed, a message of warning was transmitted among the industrial field in the context of quality management [39]. A
network nodes. The nodes watch adjacent nodes of confidence setting scheme for MANETs aimed at improving
suspicious activities [26]. A research has been made on the reliability of packet transmission over multi-hop routes in
Stable MANETs for an Intrusion Detection System (IDS). the presence of potentially malicious nodes [40]. An overlay
network solution incorporating mechanisms for routing and
reliability is proposed. It has two main components: protocol has been simulated in NS2 and compared with the Fast
EOR and protocol RTCP[53]. The Emergency Overlay Transmission based Novel Key Management (FTNKM)
Routing (EOR) protocol is a reactive protocol built into scheme. Simulation results show that TSGKM outperforms
architecture for the store-carry-forward [41]. A time-slotted FTNKM in terms of delivery in terms of communication
distributed protocol to improve ad-hoc network overhead, computational overhead, and detection accuracy.
transmissions. It is done by using the well-known multiple-
output (MIMO) computer cooperative technique [42]. An REFERENCES
Optimized and Reliable MANET AODV (ORAODV)
protocol is proposed. It adapts itself quickly according to the [1]. Dr.N.Krishnaraj, Kiranmai Bellam, “Improved
changing MANET topology conditions[51]. To retransmit Distributed Frameworks to Incorporate Big Data
the data, it uses the Blocking Expanding Ring Search through Deep Learning”, Journal of Advanced
(Blocking-ERS) method[52]. ORAODV has been shown to Research in Dynamical & Control Systems, Vol. 12,
have better performance in terms of PDR, routing overhead, 03-Special Issue, 2020.pp:332-338
and delay under different network sizes and node speeds [2]. Shankar, K., Lakshmanaprabu, S. K., Gupta, D.,
[43]. A novel method for detecting attacks on port scanning Khanna, A., & de Albuquerque, V. H. C. (2020).
using Fuzzy logic is proposed. To improve the functionality Adaptive optimal multi key based encryption for
of port scanning detection a fuzzy logic controller is digital image security. Concurrency and
designed and integrated with Snort[50]. Experiments are Computation: Practice and Experience, 32(4), e5122.
performed in wired as well as wireless networks [44]. An [3]. G. Keethana , P.Anandan “A Survey on Security
Improved Location assisted Cluster Based Routing Protocol Issues and Challenges in Mobile Ad-hoc Network”
(ILCRP) with the Mobile Ad Hoc Networks Intrusion The Energy Green, Intelligent in Computing &
Detection System. In MANETs with malicious nodes, Communication Technologies in Journal of Energy
ILCRP for GPS-enabled MANETs was analyzed, and an Web and Information
Intrusion Detection System was used to increase the packet Technologies,Vol5,Issue20,2018.
delivery ratio [45]. A changed ROUTE REQ packet in Fuzzy [4]. Chi-Hua Chen, “A Cell Probe-based Method for
enhanced ADRP to achieve security in multicast routing. By Vehicle Speed Estimation,” IEICE Transactions on
doing this even though the number of paths is decreased and Fundamentals of Electronics, Communications and
simulation time increases, protected paths are found out Computer Sciences, vol. E103-A, no. 1, pp. 265-267,
between sources to destination [46]. January 2020.
A novel, stable, MAODV based S-MAODV routing [5]. R. Meera, P.Anandan “A Review On Automatic
protocol. S-MAODV takes full advantage of trusted Detection of Brain Tumor Using Computer Aided
computing technologies, combined with the Bit-set Diagnosis System Through MRI” The Energy Green,
framework for Secure Node Authentication and Safety Intelligent in Computing & Communication
Indicator. Their SMAODV is an anonymous protocol, with Technologies in Journal of Energy Web and
no Trusted Third Party (TTP) requirement [47]. A trust Information Technologies, Vol5, Issue20, 2018.
model is used which identifies the attackers and isolates [6]. J.Sangeetha,T.Jayasankar,“ A Novel Whispered
them from the network. The attackers are identified using the Speaker Identification System Based on Extreme
energy consumption component, based on direct trust Learning Machine”, International Journal of Speech
values[48]. Nevertheless, watchdog scheme could be Technology, Springer,(2018) ,21 (1), pp.157–165.
included in the supervisor module to make the network more [7]. N.Krishnaraj, Mohamed Elhoseny,
secure [60]. A suggested Security Improvements for Mobile M.Thenmozhi,Mahmoud M.Selim , K.Shankar ,
Ad Hoc Networks use Unclear Logic for Trust “Deep Learning Model for real- time image
Management[49]. In the proposed methodology, a compression in Internet of Underwater
combination of the uncertain logic, Bayesian inference, and Things(IoUT)”, Journal of Real-time Image
Dempster-Shafer theory estimates the trust value of the Processing ,2019
monitored node [61]. A trust-enhanced, lightweight on- [8]. Chi-Hua Chen, Fangying Song, Feng-Jang Hwang,
demand multi-path routing is used in MANET. Developing a Ling Wu, “A Probability Density Function Generator
reliable routing protocol is given top priority in the proposed Based on Neural Networks,” Physica A: Statistical
technique [62]. Mechanics and its Applications, vol. 541, Article
ID 123344, March 2020.
III. CONCLUSION [9]. K.Dhanasekaran , P.Anandan, A.Manju “A
Computational Approach of Highly Secure Hash
A cross-layer based lightweight reliable and secure Algorithm For Color Image Steganography Using
multicast routing (CLR-SMR) protocol has been developed Edge Detection And Honey Encryption Algorithm”
in which a multicast tree is established. It is hierarchically International Journal of Engineering & Technology,
divided into clusters based on the depth of the tree. Then 7 PP. 239-242, 2018.
Cluster Heads (CHs) are selected based on the link stability, [10]. N.Krishnaraj,M.G.Kavitha,T.Jayasankar,K.Vinoth
residual energy power, and remaining bandwidth and Kumar , “A Glove based approach to recognize
gateway nodes are chosen depending on their residual Indian Sign Languages”, International Journal of
energy, and packet delivery rate. The proposed (TSGKM)
[34]. “Real Time Health Care Monitoring System for Compression Scheme Using Neighborhood
Driver Community Using Adhoc Sensor Network” Correlation Sequence Algorithm in WSN. IEEE
Dhanapal, R.; Visalakshi, P.Journal of Medical Transactions on Reliability.
Imaging and Health Informatics, Volume 6, Number [46]. G.S.S.S.S.V. Krishna Mohan & Yarravarapu
3, June 2016, pp. 811-815(5) Srinivasa Rao: “Optimal Order of the Differentiator
[35]. Elhoseny, M., Shankar, K., &Uthayakumar, J. Selection in Noise Removal of ECG Signals”,
(2019). Intelligent diagnostic prediction and International Journal of Recent Technology and
classification system for chronic kidney Engineering (IJRTE),Volume-7, Issue-6, 260-267,
disease. Scientific reports, 9(1), 1-14. March 2019.
[36]. “A Sector Based Energy Efficient Adaptive Routing
Protocol for Large Scale MANET” R Dhanapal, P [47]. Lydia, E. L., Raj, J. S., PandiSelvam, R., Elhoseny,
Visalakshi - Research Journal of Applied Sciences, M., & Shankar, K. (2019). Application of discrete
Engineering and Technology,volume 9(7): pages transforms with selective coefficients for blind image
478-484,2015. watermarking. Transactions on Emerging
[37]. Elhoseny, M., Bian, G. B., Lakshmanaprabu, S. K., Telecommunications Technologies, e3771.
Shankar, K., Singh, A. K., & Wu, W. (2019). [48]. GSSSSV.Krishna Mohan and Yarravarapu Srinivasa
Effective features to classify ovarian cancer data in Rao, “An efficient design of fractional order
internet of medical things. Computer Networks, 159, differentiator using hybrid Shuffled frog leaping
147-156. algorithm for handling noisy electrocardiograms”,
[38]. Dhanapal, R & Visalakshi, P 2016, “Optimizing International Journal of Computers and
Trust Based Secure Routing for Unified Efficient Applications,Feb 2019.
Resource Sharing for Large Scale MANET-TSRRS‟, [49]. Sivaram, A. M., Lydia, E. L., Pustokhina, I. V.,
Asian Journal of Information Technology, ISSN Pustokhin, D. A., Elhoseny, M., Joshi, G. P., &
:1682-3915, vol. 15, no. 19, pp. 3756-3762. Shankar, K. (2020). An Optimal Least Square
[39]. Elhoseny, M., & Shankar, K. (2020). Energy Support Vector Machine Based Earnings Prediction
efficient optimal routing for communication in of Blockchain Financial Products. IEEE Access.
VANETs via clustering model. In Emerging [50]. GSSSSV.Krishna Mohan and K.Venkata Lakshmi
Technologies for Connected Internet of Vehicles and Narayana, “Design Of A Fractional Order PID For A
Intelligent Transportation System Networks (pp. 1- Three Tank System”, International Journal of
14). Springer, Cham. Applied Engineering Research, Volume 10, Number
[40]. Dhanapal, R & Visalakshi, P 2015, “Efficient 2 (2015) pp. 3133-3148, Research India Publications,
Clustering Protocol on Ant-Bee agent for Large April 2015.
Scale Manet‟, International Journal of Applied [51]. Elhoseny, M., Selim, M. M., & Shankar, K. (2020).
Engineering Research, ISSN 0973-4562, vol. 10, no. Optimal Deep Learning based Convolution Neural
52, pp. 349-361. Network for digital forensics Face Sketch Synthesis
[41]. Krishnaraj, N., Elhoseny, M., Lydia, E. L., Shankar, in internet of things (IoT). International Journal of
K., &ALDabbas, O. (2020). An efficient radix Machine Learning and Cybernetics, 1-12.
trie‐based semantic visual indexing model for [52]. D.V.L.N.Sastry, B.Anil Kumar, P. Kameswara Rao,
large‐scale image retrieval in cloud G.S.S.S.S.V.Krishna Mohan “Tuning Of Fractional
environment. Software: Practice and Experience. Order PID Controller For Interacting Systems By
[42]. G.S.S.S.S.V.Krishna Mohan and Komanapalli Different Methods”, i--manager’s Journal on
Venkata Lakshmi Narayana, “Auto Tuning Smith- Instrumentation & amp; Control Engineering Vol.2
Predictive Control of Delayed Processes Based on No.2 May July 2014.
Model Reference Adaptive Controller”, Jour of Adv [53]. Chi-Hua Chen, Feng-Jang Hwang, Hsu-Yang Kung,
Research in Dynamical & Control Systems,Vol. 12, “Travel Time Prediction System Based on Data
04-Special Issue, p.p.1224-1230, 2020. Clustering for Waste Collection Vehicles,” IEICE
[43]. Mohanty, S. N., Lydia, E. L., Elhoseny, M., Al Transactions on Information and Systems, vol. E102-
Otaibi, M. M. G., & Shankar, K. (2020). Deep D, no. 7, pp.1374-1383, July 2019.
learning with LSTM based distributed data mining [54]. A,Venkata Naga Vamsi, G.S.S.S.S.V.Krishna
model for energy efficient wireless sensor Mohan, S.S.S.Srikanth, “Simplified Thermocouple
networks. Physical Communication, 101097. Interface For Hot Only Or Cold Only Measurement
[44]. GSSSSV.Krishna Mohan and Yarravarapu Srinivasa With Linearization Circuit”, (IJERA) International
Rao, “An efficient design of finite impulse response Journal of Engineering Research and Applications,
— Fractional-order differentiator using shuffled frog Vol. 2, Issue5, September- October 2012, pp.1663-
leaping algorithm heuristic”, International Journal of 1667.
Wavelets, Multiresolution and Information [55]. Lakshmanaprabu, S. K., Shankar, K., Ilayaraja, M.,
Processing, World Scientific Publishing Company, Nasir, A. W., Vijayakumar, V., & Chilamkurti, N.
Vol. 17, No. 2 March 2019. (2019). Random forest for big data classification in
[45]. Uthayakumar, J., Elhoseny, M., & Shankar, K. the internet of things using optimal
(2020). Highly Reliable and Low-Complexity Image